Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-12-2023 16:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
PO OAU_DECQTRFA00541·PDF.scr
Resource
win7-20231023-en
windows7-x64
8 signatures
150 seconds
General
-
Target
PO OAU_DECQTRFA00541·PDF.scr
-
Size
876KB
-
MD5
db8fdd697dafaa4aeb307452d652e0ef
-
SHA1
2addcfa14726e4c3e049873f7cfe0f2d42a04923
-
SHA256
9a37e5fffbac484741276e5f1e6e3c69edb6de33844ee2d99c9ce3adcf5deca9
-
SHA512
27fe99a63ea198bdfd9cd20415b0bf5d4a607ac8351f6c4e45df2c771ab6c6f1f4e19d386dca06d548110297f88d4bf52a0ff0d0b25890c75d3feb2213ffc827
-
SSDEEP
12288:613dUDuaee2A+cOpyd3Xo9c7T2zA+ctdOdplOXTdxvbhecadhoSHwerwGdx:I1aL2LoXGjAMCkc+w
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
uymzbwhxnsbuprue - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2368-2-0x0000000001F60000-0x0000000002008000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-5-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-4-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-7-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-11-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-9-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-17-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-19-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-15-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-13-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-21-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-23-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-27-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-31-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-33-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-37-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-39-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-35-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-29-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-25-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-41-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-45-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-51-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-53-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-49-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-47-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-43-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-55-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-63-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-65-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-67-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-61-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-59-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-57-0x0000000001F60000-0x0000000002002000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-930-0x0000000004990000-0x00000000049D0000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO OAU_DECQTRFA00541·PDF.scrdescription pid process target process PID 2368 set thread context of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
aspnet_compiler.exepid process 740 aspnet_compiler.exe 740 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO OAU_DECQTRFA00541·PDF.scraspnet_compiler.exedescription pid process Token: SeDebugPrivilege 2368 PO OAU_DECQTRFA00541·PDF.scr Token: SeDebugPrivilege 740 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aspnet_compiler.exepid process 740 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
PO OAU_DECQTRFA00541·PDF.scrdescription pid process target process PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 2368 wrote to memory of 740 2368 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO OAU_DECQTRFA00541·PDF.scr"C:\Users\Admin\AppData\Local\Temp\PO OAU_DECQTRFA00541·PDF.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:740